New malware program Poseidon targets point-of-sale systems | Newsofcrime

adsense 336x280
Retailers beware: a brand new Trojan program targets location (PoS) terminals, stealing payment card knowledge that may then be abused by cybercriminals.





The new malware program has been dubbed Greek deity by researchers from Cisco's Security Solutions (CSS) team and, like most location Trojans, it scans the RAM of infected terminals for unencrypted strings that match mastercard info -- a method referred to as memory scraping.


GitHub convalescent from large DDoS attacks
Software development platform GitHub same Sunday it absolutely was still experiencing intermittent outages from
READ NOW
This sensitive info is obtainable in plain text within the memory of a PoS system whereas it's being processed by the specialised businessperson code running on the terminal.

Security consultants have long required the employment of end-to-end secret writing technology to guard payment card knowledge from the cardboard reader all the thanks to the payment service supplier, however the quantity of systems with this capability remains low.

The CSS researchers have known 3 malware elements that area unit seemingly related to PoSeidon: a keylogger, a loader and a memory hand tool that additionally has keylogging practicality.

The keylogger is intended to steal credentials for the LogMeIn remote access application. It deletes encrypted LogMeIn passwords and profiles that area unit hold on within the system register so as to force users to kind them once more, at that purpose it'll capture them.


The CSS researchers believe this keylogger is doubtless wont to steal remote access credentials that area unit required to compromise location systems and install Greek deity.

Past studies have showed that PoS terminals area unit usually compromised through taken or brute-forced remote access credentials, as several of them area unit organized for remote technical support.

Once the Greek deity attackers get access to a PoS terminal, they install a part referred to as a loader. This part creates the register keys required to keep up the infection's persistence across system reboots and downloads another file known as FindStr from a hard-coded list of command-and-control (C&C) servers.

As its name implies, FindStr is employed to search out strings that match payment card numbers within the memory of running processes.

"The malware solely appearance for variety sequences that begin with: half dozen, 5, four with a length of sixteen digits (Discover, Visa, Mastercard) and three with a length of fifteen digits (AMEX)," the CSS researchers same during a diary post.

The Trojan then verifies that the captured strings are literally mastercard numbers by exploitation associate algorithmic program referred to as the Luhn formula, and uploads them to 1 of many command-and-control servers along side alternative knowledge captured through its key work practicality.

Unlike alternative PoS memory scrapers that store captured payment card knowledge regionally till attackers log in to transfer it, Greek deity communicates directly with external servers and might update itself mechanically. It additionally has defenses against reverse engineering.

"PoSeidon is another within the growing variety of location malware targeting PoS systems that demonstrate the subtle techniques and approaches of malware authors," the CSS researchers same. "As long as PoS attacks still offer returns, attackers can still invest in innovation and development of latest malware families."
adsense 336x280

0 Response to "New malware program Poseidon targets point-of-sale systems | Newsofcrime"

Post a Comment